Zscaler has emerged as the latest corporate victim of a supply chain attack targeting Salesforce data – Read More –
Author: Joe-W
Exploring how far cyber security approaches can help mitigate risks in generative AI systems – Read More – NCSC Feed
Malicious npm Package nodejs-smtp Mimics Nodemailer, Targets Atomic and Exodus Wallets – The Hacker News
Cybersecurity researchers have discovered a malicious npm package that comes with stealthy features to inject malicious code into desktop apps for cryptocurrency wallets like Atomic and Exodus on Windows systems. The package, named nodejs-smtp, impersonates the legitimate email library nodemailer with an identical tagline, page styling, and README descriptions, attracting a total of 347 – … Read More “Malicious npm Package nodejs-smtp Mimics Nodemailer, Targets Atomic and Exodus Wallets – The Hacker News” »
How Live Threat Intelligence Cuts Cybersecurity Expenses – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Disclosure: This article was provided by ANY.RUN. The information and analysis presented are based on their research and findings. – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
The recent mass-theft of authentication tokens from Salesloft, whose AI chatbot is used by a broad swath of corporate America to convert customer interaction into Salesforce leads, has left many companies racing to invalidate the stolen credentials before hackers can exploit them. Now Google warns the breach goes far beyond access to Salesforce data, noting … Read More “The Ongoing Fallout from a Breach at AI Chatbot Maker Salesloft – Krebs on Security” »
Hidden Commands in Images Exploit AI Chatbots and Steal Data – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Hidden commands in images can exploit AI chatbots, leading to data theft on platforms like Gemini through a… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Generative Engine Optimisation: What It Is and Why You Need an Agency for It – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
As digital marketing keeps changing, staying ahead means adopting the latest strategies that enhance online visibility and user… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
North Korea’s ScarCruft Targets Academics With RokRAT Malware – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
A new report reveals North Korea-linked ScarCruft is using RokRAT malware to target academics in a phishing campaign.… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Cybersecurity researchers are calling attention to a new shift in the Android malware landscape where dropper apps, which are typically used to deliver banking trojans, to also distribute simpler malware such as SMS stealers and basic spyware. These campaigns are propagated via dropper apps masquerading as government or banking apps in India and other parts … Read More “Android Droppers Now Deliver SMS Stealers and Spyware, Not Just Banking Trojans – The Hacker News” »
Silver Fox APT abuses Microsoft-signed drivers to kill antivirus and deploy ValleyRAT remote-access backdoor – Read More –
A vulnerability in the WordPress Paid Memberships Subscription plugin could lead to unauthenticated SQL injection on affected sites – Read More –
⚡ Weekly Recap: WhatsApp 0-Day, Docker Bug, Salesforce Breach, Fake CAPTCHAs, Spyware App & More – The Hacker News
Cybersecurity today is less about single attacks and more about chains of small weaknesses that connect into big risks. One overlooked update, one misused account, or one hidden tool in the wrong hands can be enough to open the door. The news this week shows how attackers are mixing methods—combining stolen access, unpatched software, and … Read More “⚡ Weekly Recap: WhatsApp 0-Day, Docker Bug, Salesforce Breach, Fake CAPTCHAs, Spyware App & More – The Hacker News” »
As enterprises continue to shift their operations to the browser, security teams face a growing set of cyber challenges. In fact, over 80% of security incidents now originate from web applications accessed via Chrome, Edge, Firefox, and other browsers. One particularly fast-evolving adversary, Scattered Spider, has made it their mission to wreak havoc on enterprises … Read More “When Browsers Become the Attack Surface: Rethinking Security for Scattered Spider – The Hacker News” »
Amazon Disrupts Russian APT29 Watering Hole Targeting Microsoft Authentication – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Amazon has disrupted a Russian APT29 watering hole campaign that used compromised sites to target Microsoft authentication with… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Pennsylvania’s Attorney General confirmed the OAG had refused to pay a ransom demand to the attackers after files were encrypted – Read More –
The campaign shows APT29’s intentions to “cast a wider net in their intelligence collection efforts,” said Amazon – Read More –
Spanish police have arrested a suspected hacker for accessing a government website in order to alter the high school and university entrance exam grades of not only himself, but also some of his closest classmates. Read more in my article on the Hot for Security blog. – Read More – Graham Cluley
Adversaries targeting the Salesloft Drift application integration with Salesforce have also compromised Google Workspace accounts – Read More –
ScarCruft Uses RokRAT Malware in Operation HanKook Phantom Targeting South Korean Academics – The Hacker News
Cybersecurity researchers have discovered a new phishing campaign undertaken by the North Korea-linked hacking group called ScarCruft (aka APT37) to deliver a malware known as RokRAT. The activity has been codenamed Operation HanKook Phantom by Seqrite Labs, stating the attacks appear to target individuals associated with the National Intelligence Research Association, including academic figures – … Read More “ScarCruft Uses RokRAT Malware in Operation HanKook Phantom Targeting South Korean Academics – The Hacker News” »
WhatsApp has fixed a zero-day vulnerability linked to a sophisticated cyber-attack – Read More –
Large Language Models (LLMs) like GPT-4 and Claude are changing how businesses handle data, serve customers, and manage daily… The post Beyond Encryption: How to Secure LLM Inputs and Outputs appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
Feds Seize VerifTools.Net, Operators Relaunch with VerifTools.com – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Authorities in the United States and the Netherlands have seized VerifTools, a marketplace selling fake IDs for cybercrime.… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
WhatsApp 0-Day Exploited in Attacks on Targeted iOS and macOS Users – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
WhatsApp has patched a critical 0-day (CVE-2025-55177) that allowed zero-click spyware attacks on iOS and Mac users. The… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Hackers Exploit CrushFTP Zero-Day to Take Over Servers – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
WatchTowr Labs uncovers a zero-day exploit (CVE-2025-54309) in CrushFTP. The vulnerability lets hackers gain admin access via the… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Attackers Abuse Velociraptor Forensic Tool to Deploy Visual Studio Code for C2 Tunneling – The Hacker News
Cybersecurity researchers have called attention to a cyber attack in which unknown threat actors deployed an open-source endpoint monitoring and digital forensic tool called Velociraptor, illustrating ongoing abuse of legitimate software for malicious purposes. “In this incident, the threat actor used the tool to download and execute Visual Studio Code with the likely intention of … Read More “Attackers Abuse Velociraptor Forensic Tool to Deploy Visual Studio Code for C2 Tunneling – The Hacker News” »
WhatsApp Issues Emergency Update for Zero-Click Exploit Targeting iOS and macOS Devices – The Hacker News
WhatsApp has addressed a security vulnerability in its messaging apps for Apple iOS and macOS that it said may have been exploited in the wild in conjunction with a recently disclosed Apple flaw in targeted zero-day attacks. The vulnerability, CVE-2025-55177 (CVSS score: 8.0), relates to a case of insufficient authorization of linked device synchronization messages. … Read More “WhatsApp Issues Emergency Update for Zero-Click Exploit Targeting iOS and macOS Devices – The Hacker News” »
8 Malicious NPM Packages Stole Chrome User Data on Windows – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
JFrog researchers found eight malicious NPM packages using 70 layers of obfuscation to steal data from Chrome browser… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Dexter: Resurrection Finale Leaks Online in Russian Dub – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Dexter: Resurrection finale leaks in Russian dub ahead of release. Episodes 9 and 10 surface online, echoing past… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Researchers Warn of Sitecore Exploit Chain Linking Cache Poisoning and Remote Code Execution – The Hacker News
Three new security vulnerabilities have been disclosed in the Sitecore Experience Platform that could be exploited to achieve information disclosure and remote code execution. The flaws, per watchTowr Labs, are listed below – CVE-2025-53693 – HTML cache poisoning through unsafe reflections CVE-2025-53691 – Remote code execution (RCE) through insecure deserialization CVE-2025-53694 – – Read More … Read More “Researchers Warn of Sitecore Exploit Chain Linking Cache Poisoning and Remote Code Execution – The Hacker News” »
The Federal Trade Commission thinks AI detectors might be BS. The agency announced a consent order this week with Workado, an Arizona-based company that makes an AI content detector tool. The order forces the company to retract its public claims about the tool’s effectiveness and to notify its customers. The settlement follows an investigation by … Read More “Workado settles with FTC over allegations it inflated its AI detectors’ capabilities – CyberScoop” »
The Federal Trade Commission thinks AI detectors might be BS. The agency announced a consent order this week with Workado, an Arizona-based company that makes an AI content detector tool. The order forces the company to retract its public claims about the tool’s effectiveness and to notify its customers. The settlement follows an investigation by … Read More “Workado settles with FTC over allegations it inflated its AI detectors’ capabilities – CyberScoop” »
Municipal government organisations across Sweden have found themselves impacted after a ransomware attack at a third-party software service supplier. Read more in my article on the Hot for Security blog. – Read More – Graham Cluley
Fake Facebook Ads Push Brokewell Spyware to Android Users – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
A Facebook malvertising campaign is spreading the Brokewell spyware to Android users via fake TradingView ads. The malware… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
TransUnion Data Breach: 4.4 Million US Consumers’ Data Stolen – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
A TransUnion data breach exposed 4.4 million US consumers’ Social Security numbers via a Salesforce hack. The attack… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Pyongyang-backed hacking group APT37 leveraged an internal South Korean intelligence briefing in a spear phishing campaign – Read More –
Abandoned Sogou Zhuyin Update Server Hijacked, Weaponized in Taiwan Espionage Campaign – The Hacker News
An abandoned update server associated with input method editor (IME) software Sogou Zhuyin was leveraged by threat actors as part of an espionage campaign to deliver several malware families, including C6DOOR and GTELAM, in attacks primarily targeting users across Eastern Asia. “Attackers employed sophisticated infection chains, such as hijacked software updates and fake cloud storage … Read More “Abandoned Sogou Zhuyin Update Server Hijacked, Weaponized in Taiwan Espionage Campaign – The Hacker News” »
Amazon Disrupts APT29 Watering Hole Campaign Abusing Microsoft Device Code Authentication – The Hacker News
Amazon on Friday said it flagged and disrupted what it described as an opportunistic watering hole campaign orchestrated by the Russia-linked APT29 actors as part of their intelligence gathering efforts. The campaign used “compromised websites to redirect visitors to malicious infrastructure designed to trick users into authorizing attacker-controlled devices through Microsoft’s device code – Read … Read More “Amazon Disrupts APT29 Watering Hole Campaign Abusing Microsoft Device Code Authentication – The Hacker News” »
China’s reliance on domestic technology companies to carry out large-scale hacking operations—as highlighted by the U.S. government and its allies this week—is a weakness that poses risks for Beijing, a top FBI official told CyberScoop. Cyber agencies from around the world published an alert Wednesday about what officials have described as an indiscriminate cyberespionage campaign … Read More “Top FBI official says Chinese reliance on domestic firms for hacking is a weakness – CyberScoop” »
Generative AI platforms like ChatGPT, Gemini, Copilot, and Claude are increasingly common in organizations. While these solutions improve efficiency across tasks, they also present new data leak prevention for generative AI challenges. Sensitive information may be shared through chat prompts, files uploaded for AI-driven summarization, or browser plugins that bypass familiar security controls. – Read … Read More “Can Your Security Stack See ChatGPT? Why Network Visibility Matters – The Hacker News” »
A software supply chain attack targeting Nx marks the first known case where attackers have leveraged developer AI assistants, according to StepSecurity – Read More –
The NIST National Cybersecurity Center of Excellence (NCCoE) has published the final version of NIST Internal Report (IR) 8349, Methodology for Characterizing Network Behavior of Internet of Things (IoT) Devices. Characterizing and understanding the – Read More – News and Events Feed by Topic
Recorded Future highlighted the vast capabilities of state actors to rapidly weaponize newly disclosed vulnerabilities for geopolitical purposes – Read More –
The Sangoma FreePBX Security Team has issued an advisory warning about an actively exploited FreePBX zero-day vulnerability that impacts systems with an administrator control panel (ACP) exposed to the public internet. FreePBX is an open-source private branch exchange (PBX) platform widely used by businesses, call centers, and service providers to manage voice communications. It’s built … Read More “FreePBX Servers Targeted by Zero-Day Flaw, Emergency Patch Now Available – The Hacker News” »
Click Studios Patches Passwordstate Authentication Bypass Vulnerability in Emergency Access Page – The Hacker News
Click Studios, the developer of enterprise-focused password management solution Passwordstate, said it has released security updates to address an authentication bypass vulnerability in its software. The issue, which is yet to be assigned a CVE identifier, has been addressed in Passwordstate 9.9 (Build 9972), released August 28, 2025. The Australian company said it fixed a … Read More “Click Studios Patches Passwordstate Authentication Bypass Vulnerability in Emergency Access Page – The Hacker News” »
Feds Seize $6.4M VerifTools Fake-ID Marketplace, but Operators Relaunch on New Domain – The Hacker News
Authorities from the Netherlands and the United States have announced the dismantling of an illicit marketplace called VerifTools that peddled fraudulent identity documents to cybercriminals across the world. To that end, two marketplace domains (verif[.]tools and veriftools[.]net) and one blog have been taken down, redirecting site visitors to a splash page stating the action was … Read More “Feds Seize $6.4M VerifTools Fake-ID Marketplace, but Operators Relaunch on New Domain – The Hacker News” »
The credit rating giant revealed that the breach, which occurred on July 28, was caused by unauthorized access to a third-party application – Read More –
Southeast Asia’s Hidden Crisis – Da Vinci Cybersecurity: Leading Cyber Security Services in South Africa.
The UN Reveals Widespread Trafficking into Online Scam Operations Every day, thousands of lives are torn apart in the shadows of Southeast Asia. A harrowing UN Human Rights Office (OHCHR) report from 29 August 2023 reveals that hundreds of thousands of individuals have been trafficked and forced into online scam operations, often under brutal and … Read More “Southeast Asia’s Hidden Crisis – Da Vinci Cybersecurity: Leading Cyber Security Services in South Africa.” »
Google Warns Salesloft OAuth Breach Extends Beyond Salesforce, Impacting All Integrations – The Hacker News
Google has revealed that the recent wave of attacks targeting Salesforce instances via Salesloft Drift is much broader in scope than previously thought, stating it impacts all integrations. “We now advise all Salesloft Drift customers to treat any and all authentication tokens stored in or connected to the Drift platform as potentially compromised,” Google Threat … Read More “Google Warns Salesloft OAuth Breach Extends Beyond Salesforce, Impacting All Integrations – The Hacker News” »
The semiconductor industry has become the throbbing heart of the current technology, and the tech ecosystem runs on it… The post Building Cyber Resilience in the Semiconductor Ecosystem appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
Cybersecurity researchers have discovered a cybercrime campaign that’s using malvertising tricks to direct victims to fraudulent sites to deliver a new information stealer called TamperedChef. “The objective is to lure victims into downloading and installing a trojanized PDF editor, which includes an information-stealing malware dubbed TamperedChef,” Truesec researchers Mattias Wåhlén, Nicklas – Read More – … Read More “TamperedChef Malware Disguised as Fake PDF Editors Steals Credentials and Cookies – The Hacker News” »